source: trunk/server/source4/heimdal/lib/krb5/krb5.h

Last change on this file was 745, checked in by Silvan Scherrer, 13 years ago

Samba Server: updated trunk to 3.6.0

File size: 29.0 KB
Line 
1/*
2 * Copyright (c) 1997 - 2007 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
4 * All rights reserved.
5 *
6 * Portions Copyright (c) 2009 Apple Inc. All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 *
12 * 1. Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 *
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 *
19 * 3. Neither the name of the Institute nor the names of its contributors
20 * may be used to endorse or promote products derived from this software
21 * without specific prior written permission.
22 *
23 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 * SUCH DAMAGE.
34 */
35
36/* $Id$ */
37
38#ifndef __KRB5_H__
39#define __KRB5_H__
40
41#include <time.h>
42#include <krb5-types.h>
43
44#include <asn1_err.h>
45#include <krb5_err.h>
46#include <heim_err.h>
47#include <k524_err.h>
48
49#include <krb5_asn1.h>
50
51/* name confusion with MIT */
52#ifndef KRB5KDC_ERR_KEY_EXP
53#define KRB5KDC_ERR_KEY_EXP KRB5KDC_ERR_KEY_EXPIRED
54#endif
55
56#ifndef KRB5_DEPRECATED
57#if defined(__GNUC__) && ((__GNUC__ > 3) || ((__GNUC__ == 3) && (__GNUC_MINOR__ >= 1 )))
58#define KRB5_DEPRECATED __attribute__((deprecated))
59#elif defined(_MSC_VER) && (_MSC_VER>1200)
60#define KRB5_DEPRECATED __declspec(deprecated)
61#else
62#define KRB5_DEPRECATED
63#endif
64#endif
65
66#ifdef _WIN32
67#define KRB5_CALLCONV __stdcall
68#else
69#define KRB5_CALLCONV
70#endif
71
72/* simple constants */
73
74#ifndef TRUE
75#define TRUE 1
76#define FALSE 0
77#endif
78
79typedef int krb5_boolean;
80
81typedef int32_t krb5_error_code;
82
83typedef int32_t krb5_kvno;
84
85typedef uint32_t krb5_flags;
86
87typedef void *krb5_pointer;
88typedef const void *krb5_const_pointer;
89
90struct krb5_crypto_data;
91typedef struct krb5_crypto_data *krb5_crypto;
92
93struct krb5_get_creds_opt_data;
94typedef struct krb5_get_creds_opt_data *krb5_get_creds_opt;
95
96struct krb5_digest_data;
97typedef struct krb5_digest_data *krb5_digest;
98struct krb5_ntlm_data;
99typedef struct krb5_ntlm_data *krb5_ntlm;
100
101struct krb5_pac_data;
102typedef struct krb5_pac_data *krb5_pac;
103
104typedef struct krb5_rd_req_in_ctx_data *krb5_rd_req_in_ctx;
105typedef struct krb5_rd_req_out_ctx_data *krb5_rd_req_out_ctx;
106
107typedef CKSUMTYPE krb5_cksumtype;
108
109typedef Checksum krb5_checksum;
110
111typedef ENCTYPE krb5_enctype;
112
113typedef struct krb5_get_init_creds_ctx *krb5_init_creds_context;
114
115typedef heim_octet_string krb5_data;
116
117/* PKINIT related forward declarations */
118struct ContentInfo;
119struct krb5_pk_identity;
120struct krb5_pk_cert;
121
122/* krb5_enc_data is a mit compat structure */
123typedef struct krb5_enc_data {
124 krb5_enctype enctype;
125 krb5_kvno kvno;
126 krb5_data ciphertext;
127} krb5_enc_data;
128
129/* alternative names */
130enum {
131 ENCTYPE_NULL = ETYPE_NULL,
132 ENCTYPE_DES_CBC_CRC = ETYPE_DES_CBC_CRC,
133 ENCTYPE_DES_CBC_MD4 = ETYPE_DES_CBC_MD4,
134 ENCTYPE_DES_CBC_MD5 = ETYPE_DES_CBC_MD5,
135 ENCTYPE_DES3_CBC_MD5 = ETYPE_DES3_CBC_MD5,
136 ENCTYPE_OLD_DES3_CBC_SHA1 = ETYPE_OLD_DES3_CBC_SHA1,
137 ENCTYPE_SIGN_DSA_GENERATE = ETYPE_SIGN_DSA_GENERATE,
138 ENCTYPE_ENCRYPT_RSA_PRIV = ETYPE_ENCRYPT_RSA_PRIV,
139 ENCTYPE_ENCRYPT_RSA_PUB = ETYPE_ENCRYPT_RSA_PUB,
140 ENCTYPE_DES3_CBC_SHA1 = ETYPE_DES3_CBC_SHA1,
141 ENCTYPE_AES128_CTS_HMAC_SHA1_96 = ETYPE_AES128_CTS_HMAC_SHA1_96,
142 ENCTYPE_AES256_CTS_HMAC_SHA1_96 = ETYPE_AES256_CTS_HMAC_SHA1_96,
143 ENCTYPE_ARCFOUR_HMAC = ETYPE_ARCFOUR_HMAC_MD5,
144 ENCTYPE_ARCFOUR_HMAC_MD5 = ETYPE_ARCFOUR_HMAC_MD5,
145 ENCTYPE_ARCFOUR_HMAC_MD5_56 = ETYPE_ARCFOUR_HMAC_MD5_56,
146 ENCTYPE_ENCTYPE_PK_CROSS = ETYPE_ENCTYPE_PK_CROSS,
147 ENCTYPE_DES_CBC_NONE = ETYPE_DES_CBC_NONE,
148 ENCTYPE_DES3_CBC_NONE = ETYPE_DES3_CBC_NONE,
149 ENCTYPE_DES_CFB64_NONE = ETYPE_DES_CFB64_NONE,
150 ENCTYPE_DES_PCBC_NONE = ETYPE_DES_PCBC_NONE
151};
152
153typedef PADATA_TYPE krb5_preauthtype;
154
155typedef enum krb5_key_usage {
156 KRB5_KU_PA_ENC_TIMESTAMP = 1,
157 /* AS-REQ PA-ENC-TIMESTAMP padata timestamp, encrypted with the
158 client key (section 5.4.1) */
159 KRB5_KU_TICKET = 2,
160 /* AS-REP Ticket and TGS-REP Ticket (includes tgs session key or
161 application session key), encrypted with the service key
162 (section 5.4.2) */
163 KRB5_KU_AS_REP_ENC_PART = 3,
164 /* AS-REP encrypted part (includes tgs session key or application
165 session key), encrypted with the client key (section 5.4.2) */
166 KRB5_KU_TGS_REQ_AUTH_DAT_SESSION = 4,
167 /* TGS-REQ KDC-REQ-BODY AuthorizationData, encrypted with the tgs
168 session key (section 5.4.1) */
169 KRB5_KU_TGS_REQ_AUTH_DAT_SUBKEY = 5,
170 /* TGS-REQ KDC-REQ-BODY AuthorizationData, encrypted with the tgs
171 authenticator subkey (section 5.4.1) */
172 KRB5_KU_TGS_REQ_AUTH_CKSUM = 6,
173 /* TGS-REQ PA-TGS-REQ padata AP-REQ Authenticator cksum, keyed
174 with the tgs session key (sections 5.3.2, 5.4.1) */
175 KRB5_KU_TGS_REQ_AUTH = 7,
176 /* TGS-REQ PA-TGS-REQ padata AP-REQ Authenticator (includes tgs
177 authenticator subkey), encrypted with the tgs session key
178 (section 5.3.2) */
179 KRB5_KU_TGS_REP_ENC_PART_SESSION = 8,
180 /* TGS-REP encrypted part (includes application session key),
181 encrypted with the tgs session key (section 5.4.2) */
182 KRB5_KU_TGS_REP_ENC_PART_SUB_KEY = 9,
183 /* TGS-REP encrypted part (includes application session key),
184 encrypted with the tgs authenticator subkey (section 5.4.2) */
185 KRB5_KU_AP_REQ_AUTH_CKSUM = 10,
186 /* AP-REQ Authenticator cksum, keyed with the application session
187 key (section 5.3.2) */
188 KRB5_KU_AP_REQ_AUTH = 11,
189 /* AP-REQ Authenticator (includes application authenticator
190 subkey), encrypted with the application session key (section
191 5.3.2) */
192 KRB5_KU_AP_REQ_ENC_PART = 12,
193 /* AP-REP encrypted part (includes application session subkey),
194 encrypted with the application session key (section 5.5.2) */
195 KRB5_KU_KRB_PRIV = 13,
196 /* KRB-PRIV encrypted part, encrypted with a key chosen by the
197 application (section 5.7.1) */
198 KRB5_KU_KRB_CRED = 14,
199 /* KRB-CRED encrypted part, encrypted with a key chosen by the
200 application (section 5.8.1) */
201 KRB5_KU_KRB_SAFE_CKSUM = 15,
202 /* KRB-SAFE cksum, keyed with a key chosen by the application
203 (section 5.6.1) */
204 KRB5_KU_OTHER_ENCRYPTED = 16,
205 /* Data which is defined in some specification outside of
206 Kerberos to be encrypted using an RFC1510 encryption type. */
207 KRB5_KU_OTHER_CKSUM = 17,
208 /* Data which is defined in some specification outside of
209 Kerberos to be checksummed using an RFC1510 checksum type. */
210 KRB5_KU_KRB_ERROR = 18,
211 /* Krb-error checksum */
212 KRB5_KU_AD_KDC_ISSUED = 19,
213 /* AD-KDCIssued checksum */
214 KRB5_KU_MANDATORY_TICKET_EXTENSION = 20,
215 /* Checksum for Mandatory Ticket Extensions */
216 KRB5_KU_AUTH_DATA_TICKET_EXTENSION = 21,
217 /* Checksum in Authorization Data in Ticket Extensions */
218 KRB5_KU_USAGE_SEAL = 22,
219 /* seal in GSSAPI krb5 mechanism */
220 KRB5_KU_USAGE_SIGN = 23,
221 /* sign in GSSAPI krb5 mechanism */
222 KRB5_KU_USAGE_SEQ = 24,
223 /* SEQ in GSSAPI krb5 mechanism */
224 KRB5_KU_USAGE_ACCEPTOR_SEAL = 22,
225 /* acceptor sign in GSSAPI CFX krb5 mechanism */
226 KRB5_KU_USAGE_ACCEPTOR_SIGN = 23,
227 /* acceptor seal in GSSAPI CFX krb5 mechanism */
228 KRB5_KU_USAGE_INITIATOR_SEAL = 24,
229 /* initiator sign in GSSAPI CFX krb5 mechanism */
230 KRB5_KU_USAGE_INITIATOR_SIGN = 25,
231 /* initiator seal in GSSAPI CFX krb5 mechanism */
232 KRB5_KU_PA_SERVER_REFERRAL_DATA = 22,
233 /* encrypted server referral data */
234 KRB5_KU_SAM_CHECKSUM = 25,
235 /* Checksum for the SAM-CHECKSUM field */
236 KRB5_KU_SAM_ENC_TRACK_ID = 26,
237 /* Encryption of the SAM-TRACK-ID field */
238 KRB5_KU_PA_SERVER_REFERRAL = 26,
239 /* Keyusage for the server referral in a TGS req */
240 KRB5_KU_SAM_ENC_NONCE_SAD = 27,
241 /* Encryption of the SAM-NONCE-OR-SAD field */
242 KRB5_KU_PA_PKINIT_KX = 44,
243 /* Encryption type of the kdc session contribution in pk-init */
244 KRB5_KU_AS_REQ = 56,
245 /* Checksum of over the AS-REQ send by the KDC in PA-REQ-ENC-PA-REP */
246 KRB5_KU_DIGEST_ENCRYPT = -18,
247 /* Encryption key usage used in the digest encryption field */
248 KRB5_KU_DIGEST_OPAQUE = -19,
249 /* Checksum key usage used in the digest opaque field */
250 KRB5_KU_KRB5SIGNEDPATH = -21,
251 /* Checksum key usage on KRB5SignedPath */
252 KRB5_KU_CANONICALIZED_NAMES = -23
253 /* Checksum key usage on PA-CANONICALIZED */
254} krb5_key_usage;
255
256typedef krb5_key_usage krb5_keyusage;
257
258typedef enum krb5_salttype {
259 KRB5_PW_SALT = KRB5_PADATA_PW_SALT,
260 KRB5_AFS3_SALT = KRB5_PADATA_AFS3_SALT
261}krb5_salttype;
262
263typedef struct krb5_salt {
264 krb5_salttype salttype;
265 krb5_data saltvalue;
266} krb5_salt;
267
268typedef ETYPE_INFO krb5_preauthinfo;
269
270typedef struct {
271 krb5_preauthtype type;
272 krb5_preauthinfo info; /* list of preauthinfo for this type */
273} krb5_preauthdata_entry;
274
275typedef struct krb5_preauthdata {
276 unsigned len;
277 krb5_preauthdata_entry *val;
278}krb5_preauthdata;
279
280typedef enum krb5_address_type {
281 KRB5_ADDRESS_INET = 2,
282 KRB5_ADDRESS_NETBIOS = 20,
283 KRB5_ADDRESS_INET6 = 24,
284 KRB5_ADDRESS_ADDRPORT = 256,
285 KRB5_ADDRESS_IPPORT = 257
286} krb5_address_type;
287
288enum {
289 AP_OPTS_USE_SESSION_KEY = 1,
290 AP_OPTS_MUTUAL_REQUIRED = 2,
291 AP_OPTS_USE_SUBKEY = 4 /* library internal */
292};
293
294typedef HostAddress krb5_address;
295
296typedef HostAddresses krb5_addresses;
297
298typedef enum krb5_keytype {
299 KEYTYPE_NULL = ETYPE_NULL,
300 KEYTYPE_DES = ETYPE_DES_CBC_CRC,
301 KEYTYPE_DES3 = ETYPE_OLD_DES3_CBC_SHA1,
302 KEYTYPE_AES128 = ETYPE_AES128_CTS_HMAC_SHA1_96,
303 KEYTYPE_AES256 = ETYPE_AES256_CTS_HMAC_SHA1_96,
304 KEYTYPE_ARCFOUR = ETYPE_ARCFOUR_HMAC_MD5,
305 KEYTYPE_ARCFOUR_56 = ETYPE_ARCFOUR_HMAC_MD5_56
306} krb5_keytype;
307
308typedef EncryptionKey krb5_keyblock;
309
310typedef AP_REQ krb5_ap_req;
311
312struct krb5_cc_ops;
313
314#ifdef _WIN32
315#define KRB5_USE_PATH_TOKENS 1
316#endif
317
318#ifdef KRB5_USE_PATH_TOKENS
319#define KRB5_DEFAULT_CCFILE_ROOT "%{TEMP}/krb5cc_"
320#else
321#define KRB5_DEFAULT_CCFILE_ROOT "/tmp/krb5cc_"
322#endif
323
324#define KRB5_DEFAULT_CCROOT "FILE:" KRB5_DEFAULT_CCFILE_ROOT
325
326#define KRB5_ACCEPT_NULL_ADDRESSES(C) \
327 krb5_config_get_bool_default((C), NULL, TRUE, \
328 "libdefaults", "accept_null_addresses", \
329 NULL)
330
331typedef void *krb5_cc_cursor;
332typedef struct krb5_cccol_cursor_data *krb5_cccol_cursor;
333
334typedef struct krb5_ccache_data {
335 const struct krb5_cc_ops *ops;
336 krb5_data data;
337}krb5_ccache_data;
338
339typedef struct krb5_ccache_data *krb5_ccache;
340
341typedef struct krb5_context_data *krb5_context;
342
343typedef Realm krb5_realm;
344typedef const char *krb5_const_realm; /* stupid language */
345
346#define krb5_realm_length(r) strlen(r)
347#define krb5_realm_data(r) (r)
348
349typedef Principal krb5_principal_data;
350typedef struct Principal *krb5_principal;
351typedef const struct Principal *krb5_const_principal;
352typedef struct Principals *krb5_principals;
353
354typedef time_t krb5_deltat;
355typedef time_t krb5_timestamp;
356
357typedef struct krb5_times {
358 krb5_timestamp authtime;
359 krb5_timestamp starttime;
360 krb5_timestamp endtime;
361 krb5_timestamp renew_till;
362} krb5_times;
363
364typedef union {
365 TicketFlags b;
366 krb5_flags i;
367} krb5_ticket_flags;
368
369/* options for krb5_get_in_tkt() */
370#define KDC_OPT_FORWARDABLE (1 << 1)
371#define KDC_OPT_FORWARDED (1 << 2)
372#define KDC_OPT_PROXIABLE (1 << 3)
373#define KDC_OPT_PROXY (1 << 4)
374#define KDC_OPT_ALLOW_POSTDATE (1 << 5)
375#define KDC_OPT_POSTDATED (1 << 6)
376#define KDC_OPT_RENEWABLE (1 << 8)
377#define KDC_OPT_REQUEST_ANONYMOUS (1 << 14)
378#define KDC_OPT_DISABLE_TRANSITED_CHECK (1 << 26)
379#define KDC_OPT_RENEWABLE_OK (1 << 27)
380#define KDC_OPT_ENC_TKT_IN_SKEY (1 << 28)
381#define KDC_OPT_RENEW (1 << 30)
382#define KDC_OPT_VALIDATE (1 << 31)
383
384typedef union {
385 KDCOptions b;
386 krb5_flags i;
387} krb5_kdc_flags;
388
389/* flags for krb5_verify_ap_req */
390
391#define KRB5_VERIFY_AP_REQ_IGNORE_INVALID (1 << 0)
392
393#define KRB5_GC_CACHED (1U << 0)
394#define KRB5_GC_USER_USER (1U << 1)
395#define KRB5_GC_EXPIRED_OK (1U << 2)
396#define KRB5_GC_NO_STORE (1U << 3)
397#define KRB5_GC_FORWARDABLE (1U << 4)
398#define KRB5_GC_NO_TRANSIT_CHECK (1U << 5)
399#define KRB5_GC_CONSTRAINED_DELEGATION (1U << 6)
400#define KRB5_GC_CANONICALIZE (1U << 7)
401
402/* constants for compare_creds (and cc_retrieve_cred) */
403#define KRB5_TC_DONT_MATCH_REALM (1U << 31)
404#define KRB5_TC_MATCH_KEYTYPE (1U << 30)
405#define KRB5_TC_MATCH_KTYPE KRB5_TC_MATCH_KEYTYPE /* MIT name */
406#define KRB5_TC_MATCH_SRV_NAMEONLY (1 << 29)
407#define KRB5_TC_MATCH_FLAGS_EXACT (1 << 28)
408#define KRB5_TC_MATCH_FLAGS (1 << 27)
409#define KRB5_TC_MATCH_TIMES_EXACT (1 << 26)
410#define KRB5_TC_MATCH_TIMES (1 << 25)
411#define KRB5_TC_MATCH_AUTHDATA (1 << 24)
412#define KRB5_TC_MATCH_2ND_TKT (1 << 23)
413#define KRB5_TC_MATCH_IS_SKEY (1 << 22)
414
415/* constants for get_flags and set_flags */
416#define KRB5_TC_OPENCLOSE 0x00000001
417#define KRB5_TC_NOTICKET 0x00000002
418
419typedef AuthorizationData krb5_authdata;
420
421typedef KRB_ERROR krb5_error;
422
423typedef struct krb5_creds {
424 krb5_principal client;
425 krb5_principal server;
426 krb5_keyblock session;
427 krb5_times times;
428 krb5_data ticket;
429 krb5_data second_ticket;
430 krb5_authdata authdata;
431 krb5_addresses addresses;
432 krb5_ticket_flags flags;
433} krb5_creds;
434
435typedef struct krb5_cc_cache_cursor_data *krb5_cc_cache_cursor;
436
437#define KRB5_CC_OPS_VERSION 3
438
439typedef struct krb5_cc_ops {
440 int version;
441 const char *prefix;
442 const char* (KRB5_CALLCONV * get_name)(krb5_context, krb5_ccache);
443 krb5_error_code (KRB5_CALLCONV * resolve)(krb5_context, krb5_ccache *, const char *);
444 krb5_error_code (KRB5_CALLCONV * gen_new)(krb5_context, krb5_ccache *);
445 krb5_error_code (KRB5_CALLCONV * init)(krb5_context, krb5_ccache, krb5_principal);
446 krb5_error_code (KRB5_CALLCONV * destroy)(krb5_context, krb5_ccache);
447 krb5_error_code (KRB5_CALLCONV * close)(krb5_context, krb5_ccache);
448 krb5_error_code (KRB5_CALLCONV * store)(krb5_context, krb5_ccache, krb5_creds*);
449 krb5_error_code (KRB5_CALLCONV * retrieve)(krb5_context, krb5_ccache,
450 krb5_flags, const krb5_creds*, krb5_creds *);
451 krb5_error_code (KRB5_CALLCONV * get_princ)(krb5_context, krb5_ccache, krb5_principal*);
452 krb5_error_code (KRB5_CALLCONV * get_first)(krb5_context, krb5_ccache, krb5_cc_cursor *);
453 krb5_error_code (KRB5_CALLCONV * get_next)(krb5_context, krb5_ccache,
454 krb5_cc_cursor*, krb5_creds*);
455 krb5_error_code (KRB5_CALLCONV * end_get)(krb5_context, krb5_ccache, krb5_cc_cursor*);
456 krb5_error_code (KRB5_CALLCONV * remove_cred)(krb5_context, krb5_ccache,
457 krb5_flags, krb5_creds*);
458 krb5_error_code (KRB5_CALLCONV * set_flags)(krb5_context, krb5_ccache, krb5_flags);
459 int (KRB5_CALLCONV * get_version)(krb5_context, krb5_ccache);
460 krb5_error_code (KRB5_CALLCONV * get_cache_first)(krb5_context, krb5_cc_cursor *);
461 krb5_error_code (KRB5_CALLCONV * get_cache_next)(krb5_context, krb5_cc_cursor,
462 krb5_ccache *);
463 krb5_error_code (KRB5_CALLCONV * end_cache_get)(krb5_context, krb5_cc_cursor);
464 krb5_error_code (KRB5_CALLCONV * move)(krb5_context, krb5_ccache, krb5_ccache);
465 krb5_error_code (KRB5_CALLCONV * get_default_name)(krb5_context, char **);
466 krb5_error_code (KRB5_CALLCONV * set_default)(krb5_context, krb5_ccache);
467 krb5_error_code (KRB5_CALLCONV * lastchange)(krb5_context, krb5_ccache, krb5_timestamp *);
468 krb5_error_code (KRB5_CALLCONV * set_kdc_offset)(krb5_context, krb5_ccache, krb5_deltat);
469 krb5_error_code (KRB5_CALLCONV * get_kdc_offset)(krb5_context, krb5_ccache, krb5_deltat *);
470} krb5_cc_ops;
471
472struct krb5_log_facility;
473
474struct krb5_config_binding {
475 enum { krb5_config_string, krb5_config_list } type;
476 char *name;
477 struct krb5_config_binding *next;
478 union {
479 char *string;
480 struct krb5_config_binding *list;
481 void *generic;
482 } u;
483};
484
485typedef struct krb5_config_binding krb5_config_binding;
486
487typedef krb5_config_binding krb5_config_section;
488
489typedef struct krb5_ticket {
490 EncTicketPart ticket;
491 krb5_principal client;
492 krb5_principal server;
493} krb5_ticket;
494
495typedef Authenticator krb5_authenticator_data;
496
497typedef krb5_authenticator_data *krb5_authenticator;
498
499struct krb5_rcache_data;
500typedef struct krb5_rcache_data *krb5_rcache;
501typedef Authenticator krb5_donot_replay;
502
503#define KRB5_STORAGE_HOST_BYTEORDER 0x01 /* old */
504#define KRB5_STORAGE_PRINCIPAL_WRONG_NUM_COMPONENTS 0x02
505#define KRB5_STORAGE_PRINCIPAL_NO_NAME_TYPE 0x04
506#define KRB5_STORAGE_KEYBLOCK_KEYTYPE_TWICE 0x08
507#define KRB5_STORAGE_BYTEORDER_MASK 0x60
508#define KRB5_STORAGE_BYTEORDER_BE 0x00 /* default */
509#define KRB5_STORAGE_BYTEORDER_LE 0x20
510#define KRB5_STORAGE_BYTEORDER_HOST 0x40
511#define KRB5_STORAGE_CREDS_FLAGS_WRONG_BITORDER 0x80
512
513struct krb5_storage_data;
514typedef struct krb5_storage_data krb5_storage;
515
516typedef struct krb5_keytab_entry {
517 krb5_principal principal;
518 krb5_kvno vno;
519 krb5_keyblock keyblock;
520 uint32_t timestamp;
521 uint32_t flags;
522 krb5_principals aliases;
523} krb5_keytab_entry;
524
525typedef struct krb5_kt_cursor {
526 int fd;
527 krb5_storage *sp;
528 void *data;
529} krb5_kt_cursor;
530
531struct krb5_keytab_data;
532
533typedef struct krb5_keytab_data *krb5_keytab;
534
535#define KRB5_KT_PREFIX_MAX_LEN 30
536
537struct krb5_keytab_data {
538 const char *prefix;
539 krb5_error_code (KRB5_CALLCONV * resolve)(krb5_context, const char*, krb5_keytab);
540 krb5_error_code (KRB5_CALLCONV * get_name)(krb5_context, krb5_keytab, char*, size_t);
541 krb5_error_code (KRB5_CALLCONV * close)(krb5_context, krb5_keytab);
542 krb5_error_code (KRB5_CALLCONV * destroy)(krb5_context, krb5_keytab);
543 krb5_error_code (KRB5_CALLCONV * get)(krb5_context, krb5_keytab, krb5_const_principal,
544 krb5_kvno, krb5_enctype, krb5_keytab_entry*);
545 krb5_error_code (KRB5_CALLCONV * start_seq_get)(krb5_context, krb5_keytab, krb5_kt_cursor*);
546 krb5_error_code (KRB5_CALLCONV * next_entry)(krb5_context, krb5_keytab,
547 krb5_keytab_entry*, krb5_kt_cursor*);
548 krb5_error_code (KRB5_CALLCONV * end_seq_get)(krb5_context, krb5_keytab, krb5_kt_cursor*);
549 krb5_error_code (KRB5_CALLCONV * add)(krb5_context, krb5_keytab, krb5_keytab_entry*);
550 krb5_error_code (KRB5_CALLCONV * remove)(krb5_context, krb5_keytab, krb5_keytab_entry*);
551 void *data;
552 int32_t version;
553};
554
555typedef struct krb5_keytab_data krb5_kt_ops;
556
557struct krb5_keytab_key_proc_args {
558 krb5_keytab keytab;
559 krb5_principal principal;
560};
561
562typedef struct krb5_keytab_key_proc_args krb5_keytab_key_proc_args;
563
564typedef struct krb5_replay_data {
565 krb5_timestamp timestamp;
566 int32_t usec;
567 uint32_t seq;
568} krb5_replay_data;
569
570/* flags for krb5_auth_con_setflags */
571enum {
572 KRB5_AUTH_CONTEXT_DO_TIME = 1,
573 KRB5_AUTH_CONTEXT_RET_TIME = 2,
574 KRB5_AUTH_CONTEXT_DO_SEQUENCE = 4,
575 KRB5_AUTH_CONTEXT_RET_SEQUENCE = 8,
576 KRB5_AUTH_CONTEXT_PERMIT_ALL = 16,
577 KRB5_AUTH_CONTEXT_USE_SUBKEY = 32,
578 KRB5_AUTH_CONTEXT_CLEAR_FORWARDED_CRED = 64
579};
580
581/* flags for krb5_auth_con_genaddrs */
582enum {
583 KRB5_AUTH_CONTEXT_GENERATE_LOCAL_ADDR = 1,
584 KRB5_AUTH_CONTEXT_GENERATE_LOCAL_FULL_ADDR = 3,
585 KRB5_AUTH_CONTEXT_GENERATE_REMOTE_ADDR = 4,
586 KRB5_AUTH_CONTEXT_GENERATE_REMOTE_FULL_ADDR = 12
587};
588
589typedef struct krb5_auth_context_data {
590 unsigned int flags;
591
592 krb5_address *local_address;
593 krb5_address *remote_address;
594 int16_t local_port;
595 int16_t remote_port;
596 krb5_keyblock *keyblock;
597 krb5_keyblock *local_subkey;
598 krb5_keyblock *remote_subkey;
599
600 uint32_t local_seqnumber;
601 uint32_t remote_seqnumber;
602
603 krb5_authenticator authenticator;
604
605 krb5_pointer i_vector;
606
607 krb5_rcache rcache;
608
609 krb5_keytype keytype; /* ¿requested key type ? */
610 krb5_cksumtype cksumtype; /* ¡requested checksum type! */
611
612}krb5_auth_context_data, *krb5_auth_context;
613
614typedef struct {
615 KDC_REP kdc_rep;
616 EncKDCRepPart enc_part;
617 KRB_ERROR error;
618} krb5_kdc_rep;
619
620extern const char *heimdal_version, *heimdal_long_version;
621
622typedef void (KRB5_CALLCONV * krb5_log_log_func_t)(const char*, const char*, void*);
623typedef void (KRB5_CALLCONV * krb5_log_close_func_t)(void*);
624
625typedef struct krb5_log_facility {
626 char *program;
627 int len;
628 struct facility *val;
629} krb5_log_facility;
630
631typedef EncAPRepPart krb5_ap_rep_enc_part;
632
633#define KRB5_RECVAUTH_IGNORE_VERSION 1
634
635#define KRB5_SENDAUTH_VERSION "KRB5_SENDAUTH_V1.0"
636
637#define KRB5_TGS_NAME_SIZE (6)
638#define KRB5_TGS_NAME ("krbtgt")
639#define KRB5_WELLKNOWN_NAME ("WELLKNOWN")
640#define KRB5_ANON_NAME ("ANONYMOUS")
641#define KRB5_DIGEST_NAME ("digest")
642
643typedef enum {
644 KRB5_PROMPT_TYPE_PASSWORD = 0x1,
645 KRB5_PROMPT_TYPE_NEW_PASSWORD = 0x2,
646 KRB5_PROMPT_TYPE_NEW_PASSWORD_AGAIN = 0x3,
647 KRB5_PROMPT_TYPE_PREAUTH = 0x4,
648 KRB5_PROMPT_TYPE_INFO = 0x5
649} krb5_prompt_type;
650
651typedef struct _krb5_prompt {
652 const char *prompt;
653 int hidden;
654 krb5_data *reply;
655 krb5_prompt_type type;
656} krb5_prompt;
657
658typedef int (KRB5_CALLCONV * krb5_prompter_fct)(krb5_context /*context*/,
659 void * /*data*/,
660 const char * /*name*/,
661 const char * /*banner*/,
662 int /*num_prompts*/,
663 krb5_prompt /*prompts*/[]);
664typedef krb5_error_code (KRB5_CALLCONV * krb5_key_proc)(krb5_context /*context*/,
665 krb5_enctype /*type*/,
666 krb5_salt /*salt*/,
667 krb5_const_pointer /*keyseed*/,
668 krb5_keyblock ** /*key*/);
669typedef krb5_error_code (KRB5_CALLCONV * krb5_decrypt_proc)(krb5_context /*context*/,
670 krb5_keyblock * /*key*/,
671 krb5_key_usage /*usage*/,
672 krb5_const_pointer /*decrypt_arg*/,
673 krb5_kdc_rep * /*dec_rep*/);
674typedef krb5_error_code (KRB5_CALLCONV * krb5_s2k_proc)(krb5_context /*context*/,
675 krb5_enctype /*type*/,
676 krb5_const_pointer /*keyseed*/,
677 krb5_salt /*salt*/,
678 krb5_data * /*s2kparms*/,
679 krb5_keyblock ** /*key*/);
680
681struct _krb5_get_init_creds_opt_private;
682
683struct _krb5_get_init_creds_opt {
684 krb5_flags flags;
685 krb5_deltat tkt_life;
686 krb5_deltat renew_life;
687 int forwardable;
688 int proxiable;
689 int anonymous;
690 krb5_enctype *etype_list;
691 int etype_list_length;
692 krb5_addresses *address_list;
693 /* XXX the next three should not be used, as they may be
694 removed later */
695 krb5_preauthtype *preauth_list;
696 int preauth_list_length;
697 krb5_data *salt;
698 struct _krb5_get_init_creds_opt_private *opt_private;
699};
700
701typedef struct _krb5_get_init_creds_opt krb5_get_init_creds_opt;
702
703#define KRB5_GET_INIT_CREDS_OPT_TKT_LIFE 0x0001
704#define KRB5_GET_INIT_CREDS_OPT_RENEW_LIFE 0x0002
705#define KRB5_GET_INIT_CREDS_OPT_FORWARDABLE 0x0004
706#define KRB5_GET_INIT_CREDS_OPT_PROXIABLE 0x0008
707#define KRB5_GET_INIT_CREDS_OPT_ETYPE_LIST 0x0010
708#define KRB5_GET_INIT_CREDS_OPT_ADDRESS_LIST 0x0020
709#define KRB5_GET_INIT_CREDS_OPT_PREAUTH_LIST 0x0040
710#define KRB5_GET_INIT_CREDS_OPT_SALT 0x0080 /* no supported */
711#define KRB5_GET_INIT_CREDS_OPT_ANONYMOUS 0x0100
712#define KRB5_GET_INIT_CREDS_OPT_DISABLE_TRANSITED_CHECK 0x0200
713
714/* krb5_init_creds_step flags argument */
715#define KRB5_INIT_CREDS_STEP_FLAG_CONTINUE 0x0001
716
717typedef struct _krb5_verify_init_creds_opt {
718 krb5_flags flags;
719 int ap_req_nofail;
720} krb5_verify_init_creds_opt;
721
722#define KRB5_VERIFY_INIT_CREDS_OPT_AP_REQ_NOFAIL 0x0001
723
724typedef struct krb5_verify_opt {
725 unsigned int flags;
726 krb5_ccache ccache;
727 krb5_keytab keytab;
728 krb5_boolean secure;
729 const char *service;
730} krb5_verify_opt;
731
732#define KRB5_VERIFY_LREALMS 1
733#define KRB5_VERIFY_NO_ADDRESSES 2
734
735#define KRB5_KPASSWD_VERS_CHANGEPW 1
736#define KRB5_KPASSWD_VERS_SETPW 0xff80
737
738#define KRB5_KPASSWD_SUCCESS 0
739#define KRB5_KPASSWD_MALFORMED 1
740#define KRB5_KPASSWD_HARDERROR 2
741#define KRB5_KPASSWD_AUTHERROR 3
742#define KRB5_KPASSWD_SOFTERROR 4
743#define KRB5_KPASSWD_ACCESSDENIED 5
744#define KRB5_KPASSWD_BAD_VERSION 6
745#define KRB5_KPASSWD_INITIAL_FLAG_NEEDED 7
746
747#define KPASSWD_PORT 464
748
749/* types for the new krbhst interface */
750struct krb5_krbhst_data;
751typedef struct krb5_krbhst_data *krb5_krbhst_handle;
752
753#define KRB5_KRBHST_KDC 1
754#define KRB5_KRBHST_ADMIN 2
755#define KRB5_KRBHST_CHANGEPW 3
756#define KRB5_KRBHST_KRB524 4
757#define KRB5_KRBHST_KCA 5
758
759typedef struct krb5_krbhst_info {
760 enum { KRB5_KRBHST_UDP,
761 KRB5_KRBHST_TCP,
762 KRB5_KRBHST_HTTP } proto;
763 unsigned short port;
764 unsigned short def_port;
765 struct addrinfo *ai;
766 struct krb5_krbhst_info *next;
767 char hostname[1]; /* has to come last */
768} krb5_krbhst_info;
769
770/* flags for krb5_krbhst_init_flags (and krb5_send_to_kdc_flags) */
771enum {
772 KRB5_KRBHST_FLAGS_MASTER = 1,
773 KRB5_KRBHST_FLAGS_LARGE_MSG = 2
774};
775
776typedef krb5_error_code
777(KRB5_CALLCONV * krb5_send_to_kdc_func)(krb5_context, void *, krb5_krbhst_info *, time_t,
778 const krb5_data *, krb5_data *);
779
780/** flags for krb5_parse_name_flags */
781enum {
782 KRB5_PRINCIPAL_PARSE_NO_REALM = 1, /**< Require that there are no realm */
783 KRB5_PRINCIPAL_PARSE_REQUIRE_REALM = 2, /**< Require a realm present */
784 KRB5_PRINCIPAL_PARSE_ENTERPRISE = 4 /**< Parse as a NT-ENTERPRISE name */
785};
786
787/** flags for krb5_unparse_name_flags */
788enum {
789 KRB5_PRINCIPAL_UNPARSE_SHORT = 1, /**< No realm if it is the default realm */
790 KRB5_PRINCIPAL_UNPARSE_NO_REALM = 2, /**< No realm */
791 KRB5_PRINCIPAL_UNPARSE_DISPLAY = 4 /**< No quoting */
792};
793
794typedef struct krb5_sendto_ctx_data *krb5_sendto_ctx;
795
796#define KRB5_SENDTO_DONE 0
797#define KRB5_SENDTO_RESTART 1
798#define KRB5_SENDTO_CONTINUE 2
799
800typedef krb5_error_code
801(KRB5_CALLCONV * krb5_sendto_ctx_func)(krb5_context, krb5_sendto_ctx, void *,
802 const krb5_data *, int *);
803
804struct krb5_plugin;
805enum krb5_plugin_type {
806 PLUGIN_TYPE_DATA = 1,
807 PLUGIN_TYPE_FUNC
808};
809
810struct credentials; /* this is to keep the compiler happy */
811struct getargs;
812struct sockaddr;
813
814/**
815 * Semi private, not stable yet
816 */
817
818typedef struct krb5_crypto_iov {
819 unsigned int flags;
820 /* ignored */
821#define KRB5_CRYPTO_TYPE_EMPTY 0
822 /* OUT krb5_crypto_length(KRB5_CRYPTO_TYPE_HEADER) */
823#define KRB5_CRYPTO_TYPE_HEADER 1
824 /* IN and OUT */
825#define KRB5_CRYPTO_TYPE_DATA 2
826 /* IN */
827#define KRB5_CRYPTO_TYPE_SIGN_ONLY 3
828 /* (only for encryption) OUT krb5_crypto_length(KRB5_CRYPTO_TYPE_TRAILER) */
829#define KRB5_CRYPTO_TYPE_PADDING 4
830 /* OUT krb5_crypto_length(KRB5_CRYPTO_TYPE_TRAILER) */
831#define KRB5_CRYPTO_TYPE_TRAILER 5
832 /* OUT krb5_crypto_length(KRB5_CRYPTO_TYPE_CHECKSUM) */
833#define KRB5_CRYPTO_TYPE_CHECKSUM 6
834 krb5_data data;
835} krb5_crypto_iov;
836
837
838/* Glue for MIT */
839
840typedef struct {
841 int32_t lr_type;
842 krb5_timestamp value;
843} krb5_last_req_entry;
844
845typedef krb5_error_code
846(KRB5_CALLCONV * krb5_gic_process_last_req)(krb5_context, krb5_last_req_entry **, void *);
847
848/*
849 *
850 */
851
852struct hx509_certs_data;
853
854#include <krb5-protos.h>
855
856/* variables */
857
858extern KRB5_LIB_VARIABLE const char *krb5_config_file;
859extern KRB5_LIB_VARIABLE const char *krb5_defkeyname;
860
861
862extern KRB5_LIB_VARIABLE const krb5_cc_ops krb5_acc_ops;
863extern KRB5_LIB_VARIABLE const krb5_cc_ops krb5_fcc_ops;
864extern KRB5_LIB_VARIABLE const krb5_cc_ops krb5_mcc_ops;
865extern KRB5_LIB_VARIABLE const krb5_cc_ops krb5_kcm_ops;
866extern KRB5_LIB_VARIABLE const krb5_cc_ops krb5_akcm_ops;
867extern KRB5_LIB_VARIABLE const krb5_cc_ops krb5_scc_ops;
868
869extern KRB5_LIB_VARIABLE const krb5_kt_ops krb5_fkt_ops;
870extern KRB5_LIB_VARIABLE const krb5_kt_ops krb5_wrfkt_ops;
871extern KRB5_LIB_VARIABLE const krb5_kt_ops krb5_javakt_ops;
872extern KRB5_LIB_VARIABLE const krb5_kt_ops krb5_mkt_ops;
873extern KRB5_LIB_VARIABLE const krb5_kt_ops krb5_akf_ops;
874extern KRB5_LIB_VARIABLE const krb5_kt_ops krb5_any_ops;
875
876extern KRB5_LIB_VARIABLE const char *krb5_cc_type_api;
877extern KRB5_LIB_VARIABLE const char *krb5_cc_type_file;
878extern KRB5_LIB_VARIABLE const char *krb5_cc_type_memory;
879extern KRB5_LIB_VARIABLE const char *krb5_cc_type_kcm;
880extern KRB5_LIB_VARIABLE const char *krb5_cc_type_scc;
881
882#endif /* __KRB5_H__ */
883
Note: See TracBrowser for help on using the repository browser.